PinnedHow To Prevent XSS Vulnerabilities In Rich Text EditorsCross-Site Scripting (XSS) attacks are one of the most common web application security threats today. An XSS vulnerability can be exploited…Feb 26, 2023Feb 26, 2023
How to do a Threat Modeling for Software ProductIn today’s digital age, software applications have become an integral part of our lives. We use them for everything from banking to…Mar 9, 2023Mar 9, 2023
What happens when you power on your computer?When a computer is turned on, a sequence of events takes place known as the boot process. Here is a detailed explanation of what happens…Feb 15, 2023Feb 15, 2023
What is Web Cache Poisoning?Web Cache Poisoning, also known as HTTP cache poisoning, is a type of attack that occurs when an attacker injects malicious content into a…Feb 12, 2023Feb 12, 2023
TCP Dump advance guideRecently, I published a blog post on the basics of TCP dump. In this blog, I plan to delve into advanced commands and techniques of TCP…Feb 11, 2023Feb 11, 2023
TCP Dump beginners guideTCP Dump is a powerful network packet analyzer tool that is used to capture and analyze network packets in real-time. It is widely used for…Feb 7, 2023Feb 7, 2023
Port Scanning: A Detailed Guide on Why and HowPort scanning is one of the main task when you are doing a Penetration testing engagement. After the initial reconnaissance is done, the…Aug 11, 2022Aug 11, 2022